Alert button
Picture for Lakshmanan Nataraj

Lakshmanan Nataraj

Alert button

CIMGEN: Controlled Image Manipulation by Finetuning Pretrained Generative Models on Limited Data

Jan 23, 2024
Chandrakanth Gudavalli, Erik Rosten, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath

Viaarxiv icon

MalGrid: Visualization Of Binary Features In Large Malware Corpora

Nov 04, 2022
Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Figure 2 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Figure 3 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Figure 4 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Viaarxiv icon

OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features

Nov 08, 2021
Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Tejaswi Nanjundaswamy, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Figure 2 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Figure 3 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Figure 4 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Viaarxiv icon

HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

Nov 08, 2021
Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Figure 2 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Figure 3 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Figure 4 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Viaarxiv icon

Seam Carving Detection and Localization using Two-Stage Deep Neural Networks

Sep 04, 2021
Lakshmanan Nataraj, Chandrakanth Gudavalli, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Figure 2 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Figure 3 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Figure 4 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Viaarxiv icon

SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery

Aug 28, 2021
Chandrakanth Gudavalli, Erik Rosten, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery
Figure 2 for SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery
Figure 3 for SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery
Figure 4 for SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery
Viaarxiv icon

Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices

Apr 12, 2021
Lakshmanan Nataraj, Michael Goebel, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Figure 2 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Figure 3 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Figure 4 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Viaarxiv icon

Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions

Mar 19, 2021
Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions
Figure 2 for Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions
Figure 3 for Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions
Figure 4 for Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions
Viaarxiv icon

Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning

Jan 26, 2021
Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Figure 2 for Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Figure 3 for Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Figure 4 for Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Viaarxiv icon

Detection, Attribution and Localization of GAN Generated Images

Jul 20, 2020
Michael Goebel, Lakshmanan Nataraj, Tejaswi Nanjundaswamy, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for Detection, Attribution and Localization of GAN Generated Images
Figure 2 for Detection, Attribution and Localization of GAN Generated Images
Figure 3 for Detection, Attribution and Localization of GAN Generated Images
Figure 4 for Detection, Attribution and Localization of GAN Generated Images
Viaarxiv icon